期 |
标题 |
文件 |
卷 52, 编号 8 (2018) |
An Approach to Vulnerability Searching of Integer Overflows in the Executable Program Code |
(Eng)
|
Demidov R., Pechenkin A., Zegzhda P.
|
卷 52, 编号 8 (2018) |
Modeling the Dissemination of Information Threats in Social Media |
(Eng)
|
Falcone I., Gatsenko O.
|
卷 52, 编号 8 (2018) |
Threat Analysis of Cyber Security in Wireless Adhoc Networks Using Hybrid Neural Network Model |
(Eng)
|
Demidov R., Zegzhda P., Kalinin M.
|
卷 52, 编号 8 (2018) |
Application Model of Modern Artificial Neural Network Methods for the Analysis of Information Systems Security |
(Eng)
|
Demidov R., Pechenkin A., Zegzhda P., Kalinin M.
|
卷 52, 编号 8 (2018) |
Detection of Abnormal Traffic in Dynamic Computer Networks with Mobile Consumer Devices |
(Eng)
|
Platonov V., Semenov P.
|
卷 52, 编号 8 (2018) |
The Use of Adjacency Series for Recognition of Prefractal Graphs in Assessing VANET Cybersecurity |
(Eng)
|
Zegzhda P., Ivanov D., Moskvin D., Ivanov A.
|
卷 52, 编号 8 (2018) |
Hierarchical Software-Defined Security Management for Large-Scale Dynamic Networks |
(Eng)
|
Kalinin M., Krundyshev V., Rezedinova E., Reshetov D.
|
卷 52, 编号 8 (2018) |
Detection of Threats in Cyberphysical Systems Based on Deep Learning Methods Using Multidimensional Time Series |
(Eng)
|
Kalinin M., Lavrova D., Yarmak A.
|
卷 52, 编号 8 (2018) |
A Use Case Analysis of Heterogeneous Semistructured Objects in Information Security Problems |
(Eng)
|
Zegzhda P., Poltavtseva M., Pechenkin A., Lavrova D., Zaitseva E.
|
卷 52, 编号 8 (2018) |
Security Analysis Based on Controlling Dependences of Network Traffic Parameters by Wavelet Transformation |
(Eng)
|
Lavrova D., Alekseev I., Shtyrkina A.
|
卷 52, 编号 8 (2018) |
Multifractal Analysis of Internet Backbone Traffic for Detecting Denial of Service Attacks |
(Eng)
|
Zegzhda P., Lavrova D., Shtyrkina A.
|
卷 52, 编号 8 (2018) |
A Distributed Intrusion Detection System with Protection from an Internal Intruder |
(Eng)
|
Shterenberg S., Poltavtseva M.
|
卷 52, 编号 8 (2018) |
Using Neural Networks to Detect Internal Intruders in VANETs |
(Eng)
|
Ovasapyan T., Moskvin D., Kalinin M.
|
卷 52, 编号 8 (2018) |
Ensuring Secure Data Input/Output Operations for SGX ENCLAVE |
(Eng)
|
Zegzhda D., Usov E., Nikol’skii A., Pavlenko E.
|
卷 52, 编号 8 (2018) |
Security Provision in Wireless Sensor Networks on the Basis of the Trust Model |
(Eng)
|
Ovasapyan T., Ivanov D.
|
卷 52, 编号 8 (2018) |
CRC Error Probability under Batch Random Noise |
(Eng)
|
Baranov A., Baranov P.
|
卷 52, 编号 8 (2018) |
Implementation of Mandatory Access Control in Distributed Systems |
(Eng)
|
Belim S., Belim S.
|
卷 52, 编号 8 (2018) |
Applying Garlic Routing to Guarantee Secure Collaboration of Segments in a Digital Manufacturing Network |
(Eng)
|
Dakhnovich A., Zegzhda D., Moskvin D.
|
卷 52, 编号 8 (2018) |
Modification of Preliminary Blom’s Key Distribution Scheme Taking into Account Simplex Channels |
(Eng)
|
Belim S., Belim S.
|
卷 52, 编号 8 (2018) |
Use of Statistical Processing of Reference Images in Biometric Authentication Systems |
(Eng)
|
Los’ V., Ross G., Tyshuk E.
|
卷 52, 编号 8 (2018) |
Architecture of the Protected Cloud Data Storage Using Intel SGX Technology |
(Eng)
|
Usov E., Nikol’skii A., Pavlenko E., Zegzhda D.
|
卷 52, 编号 8 (2018) |
Digital Manufacturing Security Indicators |
(Eng)
|
Zegzhda D., Pavlenko E.
|
卷 52, 编号 8 (2018) |
Using Undeniable Signature on Elliptic Curves to Verify Servers in Outsourced Computations |
(Eng)
|
Aleksandrova E., Shkorkina E.
|
卷 52, 编号 8 (2018) |
Application of Systems Theory Laws for Investigating Information Security Problems |
(Eng)
|
Volkova V., Chernyi Y.
|
卷 52, 编号 8 (2018) |
Development of a Heuristic Mechanism for Detection of Malware Programs Based on Hidden Markov Models |
(Eng)
|
Kozachok A.
|
126 - 150 的 463 信息 |
<< < 1 2 3 4 5 6 7 8 9 10 > >>
|